搜索结果: 1-3 共查到“军事学 weak-PRFs”相关记录3条 . 查询时间(0.098 秒)
Authentication from Weak PRFs with Hidden Auxiliary Input
3 round authentication protocol weak PRF
2017/9/1
In this work, we study a class of randomized weak pseudorandom functions, which we call weak PRFs with hidden auxiliary input (HIwPRF). Compared to Learning Parity with Noise (LPN) or Learning with Er...
Weak is Better: Tightly Secure Short Signatures from Weak PRFs
weak pseudorandom functions signatures lattice-based cryptography
2017/6/15
The Boyen-Li signature scheme [Asiacrypt'16] is a major theoretical breakthrough. Via a clever homomorphic evaluation of a pseudorandom function over their verification key, they achieve a reduction l...
Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
authentication schemes LPN HB authentication weak-PRFs
2013/4/18
We show how to construct, from any weak pseudorandom function, a 3-round symmetric-key authentication protocol that is secure against man-in-the-middle attacks. The construction is very efficient, req...